Chelsea Holland Komlo
  • Home
  • Tag
  • Author

On Security Assumptions Underpinning Recent Threshold Signature Schemes

Sep 13, 2022 1 min read
I recently wrote a guest blog post for the Ethereum Foundation comparing security assumptions underpinning four threshold signature schemes, including FROST. As a summary, the key difference between efficient two-round schemes (FROST and
Read Now Read Later
Chelsea H. Komlo
By: Chelsea H. Komlo

A note on proving security of Schnorr

May 4, 2022 1 min read
Schnorr signatures and identification protocols have undergone significant security analysis over the years. However, strategies for proving their security differ depending on slight variations in the schemes and security models. I wrote a
Read Now Read Later
Chelsea H. Komlo
By: Chelsea H. Komlo

Attacks and Fixes on DKGs

Nov 29, 2021 1 min read
I recently gave my first in-person lecture in almost two years since the pandemic began, and it was such a great experience. I talked about attacks and fixes for distributed key generation (DKG)
Read Now Read Later
Chelsea H. Komlo
By: Chelsea H. Komlo

FROST at the NIST Workshop on Threshold Schemes

Nov 25, 2020 1 min read
I was invited to present FROST and to give recommendations for the standardization of Schnorr threshold signatures at the recent NIST workshop on standardization of threshold schemes [https://csrc.nist.gov/Events/2020/
Read Now Read Later
Chelsea H. Komlo
By: Chelsea H. Komlo

New publication on security of applied secret sharing schemes

Dec 20, 2019 1 min read
I am excited to say that the camera ready version of our publication "Mind the Gap: Ceremonies for Applied Secret Sharing" in the Privacy Enhancing Symposium 2020 is out! You can
Read Now Read Later
Chelsea H. Komlo
By: Chelsea H. Komlo
Newer Posts
Page 2 of 3
Older Posts
Powered by Ghost
Chelsea Holland Komlo